
CVE-2020-8442 – Gentoo Linux Security Advisory 202007-33
https://notcve.org/view.php?id=CVE-2020-8442
30 Jan 2020 — In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a heap-based buffer overflow in the rootcheck decoder component via an authenticated client. En OSSEC-HIDS versiones 2.7 hasta 3.5.0, el componente del servidor responsable del análisis de registro (ossec-analysisd) es vulnerable a un desbordamiento del búfer en la región heap de la memoria en el componente rootcheck decoder por medio de un cliente autenticado. Multiple vulnerabilities have ... • https://github.com/ossec/ossec-hids/issues/1820 • CWE-787: Out-of-bounds Write •

CVE-2020-8443 – Gentoo Linux Security Advisory 202007-33
https://notcve.org/view.php?id=CVE-2020-8443
30 Jan 2020 — In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to an off-by-one heap-based buffer overflow during the cleaning of crafted syslog msgs (received from authenticated remote agents and delivered to the analysisd processing queue by ossec-remoted). En OSSEC-HIDS versiones 2.7 hasta 3.5.0, el componente del servidor responsable del análisis de registro (ossec-analysisd) es vulnerable a un desbordamiento de búfer en la región heap de la memoria po... • https://github.com/ossec/ossec-hids/issues/1816 • CWE-193: Off-by-one Error CWE-787: Out-of-bounds Write •

CVE-2020-8444 – Gentoo Linux Security Advisory 202007-33
https://notcve.org/view.php?id=CVE-2020-8444
30 Jan 2020 — In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a use-after-free during processing of ossec-alert formatted msgs (received from authenticated remote agents and delivered to the analysisd processing queue by ossec-remoted). En OSSEC-HIDS versiones 2.7 hasta 3.5.0, el componente del servidor responsable del análisis de registro (ossec-analysisd) es vulnerable a un uso de la memoria previamente liberada durante el procesamiento de mensajes c... • https://github.com/ossec/ossec-hids/issues/1817 • CWE-416: Use After Free •

CVE-2020-8445 – Gentoo Linux Security Advisory 202007-33
https://notcve.org/view.php?id=CVE-2020-8445
30 Jan 2020 — In OSSEC-HIDS 2.7 through 3.5.0, the OS_CleanMSG function in ossec-analysisd doesn't remove or encode terminal control characters or newlines from processed log messages. In many cases, those characters are later logged. Because newlines (\n) are permitted in messages processed by ossec-analysisd, it may be possible to inject nested events into the ossec log. Use of terminal control characters may allow obfuscating events or executing commands when viewed through vulnerable terminal emulators. This may be a... • https://github.com/ossec/ossec-hids/issues/1814 • CWE-20: Improper Input Validation •

CVE-2020-8446 – Gentoo Linux Security Advisory 202007-33
https://notcve.org/view.php?id=CVE-2020-8446
30 Jan 2020 — In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to path traversal (with write access) via crafted syscheck messages written directly to the analysisd UNIX domain socket by a local user. En OSSEC-HIDS versiones 2.7 hasta 3.5.0, el componente del servidor responsable del análisis de registro (ossec-analysisd) es vulnerable al salto de ruta (con acceso de escritura) por medio de mensajes syscheck diseñados directamente por un usuario local en e... • https://github.com/ossec/ossec-hids/issues/1813 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2020-8447 – Gentoo Linux Security Advisory 202007-33
https://notcve.org/view.php?id=CVE-2020-8447
30 Jan 2020 — In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a use-after-free during processing of syscheck formatted msgs (received from authenticated remote agents and delivered to the analysisd processing queue by ossec-remoted). En OSSEC-HIDS versiones 2.7 hasta 3.5.0, el componente del servidor responsable del análisis de registro (ossec-analysisd) es vulnerable a un uso de la memoria previamente liberada durante el procesamiento de mensajes con ... • https://github.com/ossec/ossec-hids/issues/1818 • CWE-416: Use After Free •

CVE-2020-8448 – Gentoo Linux Security Advisory 202007-33
https://notcve.org/view.php?id=CVE-2020-8448
30 Jan 2020 — In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a denial of service (NULL pointer dereference) via crafted messages written directly to the analysisd UNIX domain socket by a local user. En OSSEC-HIDS versiones 2.7 hasta 3.5.0, el componente del servidor responsable del análisis de registro (ossec-analysisd) es vulnerable a una denegación de servicio (desreferencia del puntero NULL) por medio de mensajes diseñados escritos directamente en ... • https://github.com/ossec/ossec-hids/issues/1815 • CWE-476: NULL Pointer Dereference •

CVE-2018-19666
https://notcve.org/view.php?id=CVE-2018-19666
29 Nov 2018 — The agent in OSSEC through 3.1.0 on Windows allows local users to gain NT AUTHORITY\SYSTEM access via Directory Traversal by leveraging full access to the associated OSSEC server. El agente en OSSEC hasta la versión 3.1.0 en Windows permite a los usuarios locales obtener acceso al sistema NT AUTHORITY\SYSTEM a través de un salto de directorio aprovechando el acceso completo al servidor OSSEC asociado. • https://github.com/ossec/ossec-hids/issues/1585 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2015-3222 – OSSEC 2.7 < 2.8.1 - 'diff' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2015-3222
12 Jun 2015 — syscheck/seechanges.c in OSSEC 2.7 through 2.8.1 on NIX systems allows local users to execute arbitrary code as root. syscheck/seechanges.c en OSSEC 2.7 hasta la versión 2.8.1 en sistemas NIX permite que los usuarios locales ejecuten código arbitrario como root. OSSEC versions 2.7 through 2.8.1 suffer from a local root escalation vulnerability. • https://packetstorm.news/files/id/132281 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2014-5284 – OSSEC 2.8 - 'hosts.deny' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2014-5284
14 Nov 2014 — host-deny.sh in OSSEC before 2.8.1 writes to temporary files with predictable filenames without verifying ownership, which allows local users to modify access restrictions in hosts.deny and gain root privileges by creating the temporary files before automatic IP blocking is performed. host-deny.sh en OSSEC anterior a 2.8.1 escribe a ficheros temporales con nombres de ficheros previsibles sin verificar su dueño, lo que permite a usuarios locales modificar las restricciones de acceso en hosts.deny y ganar pri... • https://packetstorm.news/files/id/129111 • CWE-264: Permissions, Privileges, and Access Controls •